Expert Analysis of Recent SaaS Attacks That Shocked Global Brands. Watch now

Virtual and In-Person Events

Let's connect at an upcoming event!

We actively contribute to and participate in the cybersecurity community. Come see us at an upcoming industry event or tune into one of our speaking gigs, past or present!

Headshot of main speaker: Matt Twells, Senior Solutions Architect and title of webcast: Pacemakers to Pacesetters.
Virtual Session

Past Event: Thursday, February 1, 2024

A Practical Guide to Operationalizing the FDA's 2023 Cybersecurity Requirements

Understand the impact of the FDA's HR.2617 legislation on medical device cybersecurity, learn how to build a robust plan, address vulnerabilities, manage supply chain risks, and anticipate future…

Learn More
Headshot of Dardan Prebreza, senior security consultant and webcast title: "How does social engineering works? From planning to execution"
Virtual Session

Past Event: Wednesday, January 17, 2024

How Does Social Engineering Work? From Planning to Execution

Security expert Dardan Prebreza reveals the sophisticated techniques behind modern social engineering attacks—from initial reconnaissance to exploitation—and provides actionable strategies to…

Learn More
Webcast title: Purple Teaming for Security Success with headshot of speaker, Ryan Basden.
Virtual Session

Past Event: On Demand

Purple Teaming for Security Success: Enhancing ROI and Facilitating Growth

Uncover how purple teaming can transform cybersecurity from a perceived cost center to a revenue-protecting asset. Ryan Basden, Red Team security consultant, will guide you through establishing…

Learn More
Purple gradient background with headshot of speaker on left side.
Virtual Session

Past Event: Tuesday, November 14, 2023 at 11am PT / 2pm ET

OWASP ASVS: Unlocking Stronger Application Security

Join offensive security expert Shanni Prutchi in this livestream as she shares her analysis of the 278 verification requirements listed in OWASP's Application Security Verification Standard (ASVS).…

Learn More
Video thumbnail featuring the three panelists and the title of the fireside chat on dark brackground.
Virtual Session

Past Event: Thursday, November 9, 2023 at 11 am PT / 2 pm ET

Pragmatic AI & LLM Security Mitigations for Enterprises

Immerse yourself in the vibrant world of AI and Language Learning Models (LLMs) in our webinar presented in collaboration with industry leaders from Moveworks.

Learn More
Title of the webcast plus the headshots of the four speakers.
Virtual Session

Past Event: On-Demand Virtual Session

Combatting Adversaries: Proactive Social Engineering & Network Testing

Dive deep into the trenches of internal network testing, demonstrating how it can be weaponized to impede unauthorized maneuvers within your systems, effectively reducing your attack surface.

Learn More
The Art of Hacking neon logo on dark background.
Virtual Session

Past Event: Friday, August 11, 2023 from 10 am to 2 pm PT

Hacker Evolution: From Technical Mastery to Visionary Leadership

Join us for a livestream from DEF CON 31 to hear seasoned hackers and cybersecurity experts uncover the intricacies of ethical hacking and how the hacker spirit can be harnessed to push the…

Learn More
Panel on mastering hacking tools featuring Leron Gray, Josh Shomo, David Vargas, and Dan Petro, hosted by Bishop Fox as part of 'The Art of Hacking' cybersecurity series.
Virtual Session

Past Event: Friday, August 11, 2023

Offensive Security Arsenal: Building and Mastering Custom Security Tools

In this session, learn from Bishop Fox experts who are at the cutting-edge of developing tools, technologies, and methodologies which they use to uncover vulnerabilities and offer guidance to some of…

Learn More
Cloud exploitation panel featuring Matt Johansen of Reddit, Andrew Martin of ControlPlane, and Moses Frost of Neuvik, presented by Bishop Fox in 'The Art of Hacking' cybersecurity series.
Virtual Session

Past Event: Friday, August 11, 2023

Cloud Attack Vectors: Expert Techniques for Finding Critical Vulnerabilities

In this session, we explore cloud vulnerabilities. Hear how experts uncover misconfigurations and exploit cloud-based environments.

Learn More

Ready to Get Started? Let's Connect.

Get Started

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.